Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityCybersecurity News

Why Visitor Management is Critical for Business Continuity During and Post-COVID-19

By Gregory Blondeau
visitor management
June 12, 2020

We’re seeing the term “business continuity” used everywhere nowadays, while search engines report more than 10,000 monthly searches for the word, globally. On the surface, this makes sense, given the fact that we’ve all been faced with the reality of adjusting our business models to account for the effects of COVID-19. The stronger your business continuity plan (BCP), the less you have to scramble to run your business smoothly. So, where does visitor management fall into the grand scheme of things?

Long story short, companies need to perform due care to protect their workforce from COVID-19 during and post-lockdown periods. But they also need to allow their employees, contractors and visitors onto their premises while being fully accountable for everyone’s health and safety. Aside from the basic benefits that a visitor management system affords you—efficiency, branding, security and compliance—there is also the need to uphold visitor privacy. Not only is data privacy now touted as being a basic human right, but it’s also critical going forward as we are required to collect health-related information.

 

Crucial First Steps Need to be Taken

Above all else, we should all continue to monitor public information provided by local and governmental health authorities. If you need to adopt severe measures according to government directives around safe working practices, then most of them will likely start at the entrance of your business sites. This is where choosing the right visitor management system will make all the difference. 

There are seven concrete steps you can put in place in this crisis situation, and during your recovery phase for re-entry to the office:

  1. Take a phased approach in your return to work plan: It's important to reduce the number of unexpected visitors to your property, and move to an invite-first culture where all visitors are pre-registered. This will reduce the number of non-essential visits and also allow you to screen and communicate ahead of time.
  2. Implement a touchless check-in process: By leveraging unique QR codes and access control system integrations, you can offer your visitors a safer way to move around your premises.
  3. Perform health and safety screenings ahead of time: Email your visitors important health and safety information, NDAs or agreements to sign in advance of their arrival. You can grant or deny access based on questions you’ve asked during your pre-check-in process.
  4. Customize the check-in process: Configure relevant check-in screens that allow your visitors to complete a quick health questionnaire to determine whether or not to grant then access to your premises.
  5. Integrate watchlists for monitoring visitors: Quickly and discreetly flag any visitors who may need special attention or denied access depending on a previous health and security screening.
  6. Safely and easily retrieve data: Rest assured that you‘ll have a full audit trail of data to use for insurance-related or law enforcement investigations.
  7. Real-time emergency lists: Perform roll calls or send follow-up communication, as needed, to relay important information to your visitors.

 

Be Proactive and Stay Ahead of the Crisis

It’s not too late to put a cloud-based visitor management system in place. In fact, it’s no longer a nice-to-have in this era but a must-have to future-proof your business. Your business continuity planning should include visitor management at each step in order for your organization to deliver what you’ve promised to your internal and external stakeholders alike. In order to instill the confidence your employees need to operate as “business as usual,” now and post-COVID, you’ll need to tackle the way you manage your entrances and front desks right away.

Your customers and other stakeholders will be watching to see how proactive you are in ensuring full accountability for your actions in keeping your people, your premises and your intellectual property safe. This is an opportunity to boost customer loyalty and trust, minimize downtime and recovery costs and achieve your business goals and growth despite the odds.

KEYWORDS: business continuity COVID-19 risk management visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gregory blondeau

Gregory Blondeau is CEO and Founder of Proxyclick, a provider of enterprise visitor management software. Prior to Proxyclick, he spent a short decade between Munich, London and Paris, working for the Private Telecommunications Division of Siemens AG and nurturing his interest for European politics, culture, languages and way of living. He returned to Brussels in 2000, working in two start-ups before co-funding Proxyclick. Since then, he has been working tirelessly to develop the business first in Belgium, then across Europe and in North America. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Choice Concept With Doors

    Why Visitor and Contractor Management is Critical in Busy Facilities

    See More
  • computer

    How to mitigate critical cyber risks in a post-COVID-19 environment

    See More
  • Cyber security threat

    Why cyber resilience must be the strategic focus for business continuity

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing